VMware Workshop
Secure Software Defined Data Center and
WAN for the Cyberspace Battlefield
 
Wednesday, July 18, 2018
11:30am-6:00pm
Fayetteville Fort Bragg
The Sicily Room
4760 Lake Valley Drive
Fayetteville, NC 28303
The speed and pace of cyber threats by state and non-state actors are bombarding DoD network defenses and threatening to undermine the United States' technological military advantage. The recent elevation of US Cyber Command to a unified combatant command demonstrates the resolve to embrace the changing nature of warfare in order to maintain US military superiority across all domains and phases of conflict. This ever-changing face of war has created the Cyberspace AOR, driving the need for an integrated security strategy between the physical and virtual battlefield. 

The previous approach to securing data and systems has emphasized strong perimeter protection to keep threats on the outside of the network. This model is ineffective for handling new types of threats, such as advanced persistent threats, sophisticated insider threats, and coordinated attacks. What is needed is a scalable security model, which detects potential nefarious actors, regardless of location within the environment, and stops them at point of origin. 

Having a static and inflexible network architecture is not an option; a network with optimal operational control needs to be baked in, not bolted on. It should require zero-touch deployment, and be application-defined and fully virtualized.

Agenda
TimeSession
11:30am - 12:00pmLunch
12:00pm - 3:30pmBriefings
3:30pm - 4:00pmQ&A
4:00pm - 6:00pmNetworking

Please join us on July 18 to learn how VMware's integrated solutions can help your organization achieve a secure software defined data center (SDDC) for the cyberspace battlefield. During this session, we will discuss how to create a cost effective, cyber-resilient software defined infrastructure through:
  • The established, authoritative, and intended state of a workload's security context
  • A separate trust zone for monitoring
  • Secured and hardened hosts and applications
  • Orchestrated and automated incident response and disaster recovery
  • Multiple links, devices, and services enabled to coexist and interoperate with incumbent solutions in tactical environments
  • Faster provision networks with automated zero-touch deployment, simplified configuration, orchestration and on-going monitoring with centralized troubleshooting tools
Don't miss out! Register today.

carahsoft
Brandon Toye
703-581-6619
In partnership with:
 
 
 
© 2018 Carahsoft Technology Corp.
1860 Michael Faraday Drive, Suite 100
Reston, Virginia  20190
www.carahsoft.com
T: 703.871.8500  |  F: 703.871.8505